Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 364 of 365

Designing Electronics That Work

Access, “Free” Download, and Gumroad Friction

  • Several commenters struggled to get the promised “free” PDF: Gumroad showed “sold out” or required entering a price, then an email, then sometimes still no file.
  • There’s debate over whether something is truly “free” if it requires an email; some argue email/privacy and spam risk are a real cost, others treat it like normal access control (e.g., showing a membership card for free samples).
  • Some view the broken “free” link plus push to a new paid edition as disingenuous or a marketing stunt; others note the PDF was from 2021 and likely just not properly taken down during the transition to a No Starch edition.
  • Multiple people wanted physical copies but found both print and “free” digital versions unavailable.

Hardware Is Hard and Often a Money Pit

  • Multiple software engineers describe being humbled by real-world hardware design: moving from prototype to manufacturable product requires huge effort in DFM, layout, assembly quirks, adhesives, stress fractures, etc.
  • Hardware careers are portrayed as lower paid and more demanding than software; some see dwindling new EE talent in the US and aging experts, making passion the main motivator.

Positioning vs. Other Electronics Books

  • Commenters compare this book to “The Art of Electronics”: AoE is seen as an outstanding but heavy, theory-centric textbook, while this book targets practical product design and process.
  • Some say it fills a niche for “getting a product out the door” rather than deep theory, and could complement AoE.
  • Others argue it’s rule-based and prescriptive, with not enough underlying theory to know when its advice fails; they recommend “Analog SEEKrets” and similar resources for leveling up.

Technical and Safety Critiques

  • Concern about recommendations like n‑propyl bromide (described as neurotoxic) and casual solvent choice; long subthread on IPA vs ethanol, denaturants, residue, and flux removers.
  • One commenter notes inaccuracies/overstatements around ferrite beads and SMPS datasheet guidance.
  • Discussion on certification labs, FCC/CE, UL’s role, and the cost/“hazing” of getting real products certified; also, widespread lack of metrology awareness among EEs.

Components, Packages, and DFM Concerns

  • Strong plea for avoiding leadless/super-small parts where not needed, emphasizing repairability and manufacturability.
  • Counterpoint: modern shops should handle QFNs/DFNs; at scale, board space often outweighs rework pain.
  • Clarification that “leadless” discussion is about package leads, not Pb metal and RoHS; RoHS pressures still favor lead‑free solder.

Learning Path and Resources for Beginners

  • Several people ask for truly beginner‑friendly electronics books; AoE is seen as too steep for absolute novices.
  • Alternatives suggested include Forrest Mims’ books and “Practical Electronics for Inventors,” plus ham radio licensing, LTSpice, and classic circuit encyclopedias as practical training paths.

Two new PebbleOS watches

Positioning & Purpose

  • New watches are framed as “Pebble reborn”: simple, long‑battery smartwatches focused on notifications, time, light health tracking, and hackability, not on competing head‑on with Apple/Garmin as full sports watches.
  • Target audience is explicitly niche: enthusiasts, developers, people who liked the original Pebble “ethos” (purpose‑built, low‑friction, always‑on display).

Hardware Features & Omissions

  • Core 2 Duo: monochrome memory‑LCD, plastic case, compass + barometer, no heart‑rate, no NFC, no GPS, “standard Pebble” pogo‑pin charger, 30fps screen, July ship.
  • Core Time 2: larger 64‑color reflective LCD, metal case, heart‑rate sensor, speaker/mic, but no compass/barometer, December ship.
  • Lack of NFC and GPS is a recurring complaint, especially from runners and people used to watch payments; others point out that phones can provide GPS and payments for many use cases.
  • No LTE, no wireless charging; proprietary magnetic cable but very long battery life is expected to reduce cable pain.
  • Some concern about comfort and sleep tracking with the HR sensor “bump”.

Openness, Hacking & Ecosystem

  • Firmware will be open; same BLE protocol as legacy Pebbles, so Gadgetbridge and existing tools should “just work”.
  • Existing open companion app (Cobble); new open library planned for others to build apps.
  • Old Pebble SDK, docs and appstore (Rebble) remain relevant; updated SDK and better docs are promised.
  • Thread/Zigbee/802.15.4 support is theoretically possible via the nRF52840 but not planned; community is encouraged to experiment.
  • Clarification that the current GitHub firmware repo description is outdated; aim is to make it actually buildable.

Design, Naming & Form Factors

  • Strong split on aesthetics: some love the retro/Casio‑like, “fun” look; others find Core Time 2 bulky or “step back” versus Pebble Time Steel/Round and want slimmer, round or more “timeless” cases.
  • Many requests for a future Pebble Time Round‑style model; hints that it’s plausible but not this year.
  • The “Core 2 Duo” name is widely debated: some find it funny and nostalgic, others see trademark risk with Intel and poor searchability.

Price, Warranty & Business Risk

  • Prices ($149 / $225) are seen by some as high relative to cheap Amazfit/BangleJS‑type devices, and by others as reasonable given low volumes and inflation vs 2015 Pebbles.
  • One‑year warranty and explicit refusal to promise cheap “at‑cost” replacements spur concern from users wary of hardware failing just after coverage.
  • Tariff clause (customer may owe more if import duties spike) deters some international buyers; others appreciate the transparency but prefer to wait.

Comparisons & Use Cases

  • Compared against Apple Watch, Garmin, Amazfit, BangleJS, etc.:
    • Pebble‑style strengths: battery life, always‑on reflective display, physical buttons, hackability, open ecosystem.
    • Weaknesses: no GPS, no NFC, no advanced fitness metrics, iOS limitations due to Apple’s APIs.
  • Use‑case split:
    • Fans: notifications triage, media control, simple fitness (steps, sleep, HR), open experimentation, diabetic CGM display, minimalist/less‑phone lifestyles.
    • Skeptics: for serious sports or rich health analytics they still prefer Garmin/Apple; some feel 2025 alternatives are more capable for less money.

Health, Data & Privacy

  • Strong interest in open access to health data (steps, HR, sleep) and bulk export; frustration with other vendors’ lock‑in (e.g., processed “sleep phase” data).
  • Questions about HR accuracy and suitability for HRV; earlier Pebble HR API only exposed ~1 Hz data.
  • Some want fully offline or de‑Googled/GrapheneOS‑friendly setups, ideally with no cloud dependency; consensus is that openness plus Android makes this feasible, but iOS remains constrained.

Community Sentiment & Nostalgia

  • Many long‑time Pebble users are enthusiastic, pre‑ordering to “support the cause” and keep the ecosystem alive.
  • A minority is openly distrustful due to how the original company shut down, and others are simply nostalgic but conclude they don’t truly need a smartwatch anymore.

'Dogequest' Site Claims to Dox Tesla Owners Across the U.S.

Ethics and Goals of Doxxing Tesla Owners

  • Many commenters condemn Dogequest-style targeting as “hate-promoting,” bullying, and political intimidation that predictably leads to vandalism and possible violence against random owners rather than decision‑makers.
  • Several call it terrorism or “forcing alignment through fear,” arguing it will backfire by radicalizing moderates and strengthening Musk’s victim narrative.
  • Others distinguish between moral criticism and physical attacks: stigmatizing the brand and tanking resale value is seen by some as a legitimate economic weapon; vandalism and threats are not.
  • A smaller group argues that harming Tesla’s brand and used market is one of very few levers ordinary people have to reduce Musk’s political power, since his wealth is largely tied to Tesla.

Responsibility and Burden on Tesla Owners

  • Debate over whether existing owners should sell: some say yes, to withdraw support and send a market signal; others see this as performative, costly, and unfair to people who bought pre‑“Musk went crazy,” often for environmental reasons.
  • Counter-argument: ongoing subscriptions, Supercharger use, and resale values still support Tesla; depressing those is part of pressure.
  • Strong pushback from owners who feel punished “through no fault of my own,” especially those upside‑down on loans or dependent on the car.
  • Broader clash over apoliticism: one side insists “if you’re apolitical you support what’s happening”; others find this absolutism exhausting and corrosive, arguing consumers can’t be morally responsible for every corporate sin.

Musk, Fascism, and Symbolism of the Brand

  • Heated argument over Musk’s alleged Nazi salute and general alignment with the current administration and far‑right politics; some see Tesla as now symbolically akin to a fascist flag, others say that’s hyperbolic.
  • Comparisons made to other automakers’ past or present abuses (Nazi-era forced labor, Uyghur-linked supply chains, data harvesting), with disagreement over how much historical versus current behavior should matter.
  • Several note Tesla’s shift from “left-leaning eco car” to culture‑war totem; some predict Republicans will increasingly adopt Teslas “to own the libs.”

Effectiveness and Polarization

  • Skeptics argue this kind of activism only energizes the “choir,” alienates the vast middle, and is “a net negative” for anti-fascist goals and for electoral outcomes.
  • Others respond that norms‑breaking tactics (boycotts, disruptive protests) historically can work, and that conventional, “polite” opposition has failed to constrain Musk and similar actors.
  • There’s recurring fear that escalating tit‑for‑tat around symbols (cars, houses, property) pushes the U.S. toward deeper instability or even civil conflict.

The Dogequest Site Itself

  • Users locate and test the site; data appears extremely incomplete and inaccurate (e.g., one or two Teslas shown in obviously dense areas, mismatched locations), suggesting a low‑quality or hastily assembled dataset.
  • Some speculate it might be a short‑and‑distort, foreign influence, or honeypot operation; others think it’s just a clumsy stunt. No clear consensus on its origin or real impact.

Java 24

Virtual Threads and Pinning Removal

  • Biggest excitement is around “no pinning” for virtual threads when entering synchronized blocks (JEP 491).
  • Previously, virtual threads could pin carrier threads under locks, harming scalability and even causing deadlocks when carrier threads were exhausted.
  • Now, people feel safe running existing synchronized-heavy code (e.g., JDBC, ORMs, connection pools) on virtual threads without refactoring to ReentrantLock.
  • Some ask how common “lock while doing I/O” really is; others report it occurs in real-world libraries and was a practical problem.

Impact on Async / Event-Loop Libraries

  • Some commenters claim virtual threads largely remove the need for complex async/event-loop paradigms (Netty, reactive stacks) for I/O-bound workloads.
  • Pushback: event-loop models still have advantages (no locking, simpler shared-state reasoning on a single-threaded loop), so they’re not “obsolete,” just less necessary for scalable concurrency.

Structured Concurrency and Concurrency Models

  • Strong interest in structured concurrency leaving preview, seen as closing a gap with Go and improving “fire off N tasks + wait + collect errors” patterns.
  • Discussion compares Java’s direction to Go (goroutines criticized as “unstructured”) and Kotlin (coroutines seen as more ergonomic but also more complex to integrate across platforms).
  • Some miss explicit async/await, others argue virtual threads make “awaits” implicit and avoid function coloring.

Security Manager Removal

  • Controversial: some see its removal as a needless loss of a unique sandboxing feature that could help with supply-chain attacks.
  • Others argue it was rarely used, hard to maintain, and ineffective compared to OS/container sandboxing; removal is framed as a major maintainability win.
  • Debate over whether the impact on existing SecurityManager-dependent systems is significant; usage is claimed to be “tiny,” but not quantified.

Other Notable Features & JEPs

  • Stream Gatherers (e.g., sliding windows) praised as a powerful extension of Streams.
  • Stabilized FFI, AOT linking, Compact Object Headers v2, and Classfile API (JEP 484) are highlighted as important, especially for tooling and startup performance.
  • Many expect structured concurrency and more Valhalla pieces (e.g., generics over primitives, nullability) in upcoming LTS releases.

Licensing and Distributions

  • Confusion over Oracle JDK licensing: some say “free but must stay on latest,” others advise avoiding Oracle builds unless required by enterprise contracts.
  • Consensus: most users should prefer OpenJDK-based distributions (e.g., Amazon Corretto, Temurin); functionally similar, fewer licensing headaches.

Java vs Kotlin/Scala and Ecosystem

  • Java is seen as rapidly closing the feature gap with Kotlin (records, pattern matching, sealed types); Kotlin still ahead on nullability and conciseness.
  • Some prefer Kotlin or Scala for expressiveness; others value Java’s stability, tooling, and “host language” status on the JVM.
  • Commenters note many organizations are still on Java 8 or 11, missing recent improvements but often prioritizing stability and other work.

You Do Not Need Blockchain: Popular Use Cases and Why They Do Not Work (2019)

Age of the article & hype cycles

  • Several note the piece is “from the past” (2019) and that blockchain has since been largely de‑hyped.
  • Comparison to AI: some expect a similar hype crash; others argue AI is different because it already has wide everyday use.
  • Historical perspective: AI hype has cycled since the 1950s; current AI boom is contrasted with the much weaker real-world impact of blockchain.

Where blockchain/crypto actually get used

  • Many say the only widespread use is cryptocurrency for speculation, gambling, and (often) illegal commerce.
  • Specific non‑speculative examples mentioned:
    • Conflict‑diamond and hardwood tracking using serialized physical markings tied to a ledger.
    • Parametric disaster insurance (automatic payout based on sensor/oracle data).
    • Tokenized T‑bills / RWAs, stablecoins, and cross‑border payments, especially to evade slow/expensive banking rails or capital controls.
    • Smart‑contract governance and on‑chain computation as a niche with growing funding.
  • Some see NFTs/digital objects as a more coherent authenticity use case than physical provenance.

Critiques of non‑currency blockchain use cases

  • Thread strongly echoes the article’s theme: if a normal database or shared SQL system works, blockchain adds cost and complexity for little gain.
  • Physical-object authenticity and supply-chain tracking are seen as fundamentally oracle/IoT problems; blockchain doesn’t solve the “real world to ledger” link.
  • Argument that once you introduce external oracles, blockchain adds negative value versus a trusted database, since trust is already centralized.
  • Enterprise “blockchain as trigger” architectures are reported, from experience, to be poor fits.
  • NIST-style checklists (shared store, immutable log, multiple contributors, no sensitive data) are referenced as a sanity check; almost no projects truly “need” those properties.

Law, politics, and social contract

  • Heated debate over governments holding seized crypto vs selling it, and whether that’s effectively taxpayer exposure.
  • Broader dispute: fiat as part of a social contract funding infrastructure vs cryptocurrency as a way to free‑ride and hoard wealth outside state systems.
  • Others counter that states are unreliable or coercive, and that using crypto to bypass capital controls or sanctions can be legitimate (e.g., sending money to Russia, escaping authoritarian regimes).
  • Crypto’s role in money laundering and crime is acknowledged even by some who still see technical value.

Decentralization, reliability, and technical arguments

  • Disagreement over whether blockchains are truly decentralized or just a single, globally replicated “center.”
  • Bitcoin’s design (no trusted central authority, solution to double spending) is defended; critics reply that real power still concentrates and forks are catastrophic.
  • Oracles remain a central unsolved problem for tying on‑chain logic to off‑chain events; multi‑oracle schemes mitigate but don’t remove trust.
  • Comparisons to Git: both use hash chains; Git already offers immutable history, while branch/tag mutability is a separate, solvable issue without PoW.
  • Scaling critique: blockchain cost grows with users and can’t be “fixed” by L2s in principle, unlike AI which benefits from scale.

User stories vs. “no real use”

  • Some crypto users describe genuine advantages: fast, global, same‑day settlement with stablecoins, bypassing bank delays, freezes, and KYC friction.
  • Skeptics respond that similar things are already available via Wise/PayPal/etc., and frame crypto’s main advantages as speculation and law evasion.
  • A recurring meta‑point: defenders often retreat to “you’re not the target user; others get value,” which skeptics see as evasive and non‑falsifiable.

Communication, grift, and incentives

  • Many note the ecosystem’s “universe of memecoins, hacks, scams” and see that as intrinsic to the technology’s incentive structure.
  • Observation that significant personal investment in crypto makes unbiased evaluation difficult.
  • DeFi marketing is criticized as opaque jargon that hides complex trust models; example projects require deep digging to understand that risk is merely shifted (e.g., from custodial bridges to oracle manipulation).
  • Simple heuristic proposed: ask whether the use case would be better served by an off‑the‑shelf SQL database; for most 2019‑era projects, the answer was “yes.”

2FA or Not 2FA

Password Reuse vs Strong Unique Passwords

  • Many argue the real threat isn’t brute‑forcing long passwords but password reuse plus data breaches and credential stuffing.
  • Strong, unique passwords per site plus a password manager are widely seen as a baseline; reuse is strongly discouraged even with 2FA.
  • Some justify weak passwords for “throwaway” accounts; others counter that compromised accounts can still be abused (spam, impersonation).

Benefits and Limitations of 2FA

  • Supporters: 2FA/MFA is crucial against phishing, credential stuffing, and poorly secured services; hardware tokens (e.g., FIDO2/WebAuthn) are viewed as the only truly phishing‑resistant mainstream option.
  • Critics: mandatory 2FA increases lockout risk, especially when tied to a single phone or SMS; availability is part of security, not just confidentiality.
  • Several note 2FA implementations are often fragile, phishable (SMS, email, TOTP), or security theater.

Availability, Lockout, and Backup

  • Many focus on recovery codes and backup procedures as an underappreciated failure point; users misplace codes or lose phones and are locked out.
  • Storing TOTP secrets or recovery codes in a password manager is common, acknowledged as “1.5FA” but seen as a pragmatic tradeoff.

Passkeys: Promise and Lock‑In

  • Passkeys are praised for solving phishing and password usability, but there is concern about:
    • Tying access to a single vendor ecosystem (Apple/Google/Microsoft).
    • Export/interoperability, attestation “anti‑features”, and de‑facto platform lock‑in.
  • Some use passkeys via third‑party managers as a convenient “skip 2FA screen” mechanism, not as a full password replacement.

SMS, Phone Numbers, and Privacy

  • SMS 2FA is heavily criticized: SIM‑swap risk, roaming/coverage failures, and exclusion of people without reliable phone service.
  • Phone-number‑based identity harms anonymity and can enable denial of access if carriers or providers misbehave.

Password Managers and UX Friction

  • There is debate over which password managers to trust (SaaS vs local, multi‑platform support).
  • Convenience issues (multiple devices, extra clicks, 2FA app fragmentation) drive some users to weaker practices like browser‑stored passwords.

Whose Risk Is Being Managed?

  • Several suggest required 2FA primarily protects service providers from abuse of weak accounts, reducing abuse workload and business risk.
  • Others stress that both user and provider threat models matter, and 2FA is a reasonable response to widespread poor password hygiene.

Side Discussion: HTTPS

  • The article’s lack of HTTPS is criticized; some say static content “doesn’t need it,” others emphasize integrity and privacy for all pages.

Stamina Is a Quiet Advantage

Stamina vs. Stimulants and Pleasure

  • Several comments distinguish “true” stamina from drug-fueled productivity; heavy use of caffeine and nootropics is described as compensating for a lack of stamina, not evidence of it.
  • One view: stimulants mainly increase pleasure and make tasks tolerable; real stamina is enduring lack of pleasure in pursuit of something good.
  • Counterpoint: framing pleasure vs. the good as opposites is misleading; when work is genuinely “good,” it’s often naturally rewarding, and chemicals may be filling a gap where the work itself is not.

Focus, Distraction, and Motivation

  • Stamina is linked to saying “no” to distractions and competing opportunities; focus is framed as a quiet superpower.
  • Simple models are proposed: e.g., Focus = Energy – Distraction; Success = Focus × Time, plus a “luck” term some argue is crucial but uncontrollable.
  • Another model (from procrastination research) treats motivation as expectancy × value divided by impulsiveness × delay.
  • Debate over tactics: some emphasize tiny habits and making tasks easy; others say small habits never stick and they need big, intense commitments.

Persistence, Stubbornness, and Being Right

  • Many agree persistence often beats raw intelligence: just staying with hard problems can be transformative for careers.
  • Others stress persistence is a double-edged sword: stubbornness plus being wrong leads to wasted lives and forgotten scientists; sunk-cost fallacy is a real risk.

The Hidden Cost of Extreme Stamina

  • Multiple intense personal stories describe working or caregiving at “110%” for years (degrees while working full-time, major illness, NICU babies, big projects during personal crises).
  • After such periods, people report a lasting change: difficulty feeling joy, loss of “inner reserve,” emotional numbness, or reduced will to push hard again.
  • Some attribute this to burnout-like processes and chronic compartmentalization of feelings; therapy and time help but don’t fully restore the old self.
  • There’s debate whether this is mostly aging, cumulative trauma, or a one-time depletion of some non-renewable inner resource.

Where and When to Spend Stamina

  • Several comments emphasize that stamina only helps if the goal is well-chosen (career moves, equity in startups, relationships, academic paths).
  • Advice: save maximal effort for situations where you share in the upside (e.g., good founding roles) and avoid burning out for low-ownership, dysfunctional environments.

Culture, Interest, and Built Stamina

  • Observations from Asia highlight cultural norms of “eating bitterness” and extreme study schedules as examples of socially reinforced stamina.
  • Commenters note their own capacity varies dramatically with interest: they can work endlessly on engaging tasks but “chew glass” on others.

Skepticism and Limits

  • Some argue habits outperform raw stamina over the long term.
  • A minority is strongly skeptical of stamina/self-help narratives, noting that for some skills, thousands of hours don’t yield improvement, so “just persist” advice can mislead or blame the strugglers.

Google to buy Wiz for $32B

Valuation and Deal Size

  • Many commenters are stunned by the $32B all‑cash price, noting estimates of ~$500M–$1B ARR imply ~30–60x revenue, even for a fast‑growing SaaS business.
  • Comparisons are made to WhatsApp/Instagram and YouTube: those were consumer networks or patent plays; Wiz is niche B2B SaaS, so justification feels less obvious to many.
  • Some argue the price reflects future growth plus strategic value (blocking rivals, upselling GCP, defensive move), others see it as gross overpayment or even “money laundering”/nepotism.

What Wiz Actually Does

  • Multiple practitioners describe Wiz as a CNAPP/CSPM platform:
    • Connects to cloud accounts (AWS, Azure, GCP, others) with high read privileges.
    • Snapshots disks/volumes agentlessly to scan for vulnerabilities, secrets, malware.
    • Maps resources and relationships via a graph engine, surfaces misconfigurations, over‑permissive IAM, exposed services, compliance violations, etc.
    • Provides rich dashboards, query language, policy‑as‑code (OPA), and integrations to route findings to teams.
  • Users generally praise its UX, power, and ease of onboarding (“5 minutes per tenant”), calling it best‑in‑class and far ahead of many legacy competitors.

Strategic Rationale for Google Cloud

  • Several see this as part of Google Cloud’s push to differentiate on security (after Chronicle, Mandiant) rather than raw infrastructure where AWS/Azure dominate.
  • Wiz is already native on GCP Marketplace and reportedly used by many large enterprises; acquiring it gives Google:
    • A “beachhead” in non‑GCP Fortune 100 accounts.
    • A sales lever to win cloud migrations (“we’re the most secure cloud”).
    • A ready‑made, highly regarded security product line.

Multi‑Cloud, Antitrust, and Customer Impact

  • Big open question: will Wiz remain truly multi‑cloud?
    • Some expect Google to keep AWS/Azure support to preserve value and use it as a “second cloud” bridge.
    • Others predict slow degradation of non‑GCP support, driving customers to competitors (Orca, Prisma, CrowdStrike, etc.).
  • Antitrust concern is seen as lower than in ads/search because cloud security is highly fragmented with many alternatives.

Data Access, Privacy, and Espionage Concerns

  • Strong thread worries about Wiz’s deep read access to government and Fortune 500 clouds: snapshots, installed packages, exposed secrets, runtime sensors with high privileges.
  • Some speculate Google could use aggregated Wiz data to:
    • Profile AWS/Azure usage and undercut them in deals, or
    • Even feed AI models or analytics.
      Others counter that contracts, audits (SOC2, FedRAMP, GDPR, etc.) and customer backlash would make such use legally and commercially suicidal.

Google Culture and Product Track Record

  • Skeptical voices highlight Google’s spotty history with acquisitions (Nest, Fitbit, Stadia), fear innovation will stall and multi‑cloud features will wither.
  • Recurrent criticism: weak enterprise account management and support vs AWS/Microsoft; some doubt Google can fully capitalize on Wiz’s enterprise footprint.

Ethics, Politics, and Sales Tactics

  • Much debate around Wiz’s founders’ Unit 8200 background and an associated VC’s CISO “loyalty program,” described in reports as bordering on kickbacks; some see this as explaining ultrafast growth.
  • A political subthread frames the deal within US–Israel ties and lobbying; others dismiss these angles as conspiratorial and unrelated to the core business logic.

Sync Engines Are the Future

Security, Servers, and “Database-as-API”

  • Several commenters argue directly exposing a database to clients is inherently risky; traditional practice is to hide it behind an app server that enforces permissions and business rules.
  • Sync/hosted-DB systems (Firebase-style) are seen as powerful but difficult to secure correctly; access-control rules are complex and error-prone.
  • Enterprise and high‑security use cases especially struggle with row‑level permissions, revocation, and ensuring cached offline data remains authorized.

Network Unreliability and Layering

  • The essay’s “decoupled from an unreliable network” line draws pushback: there is no reliable network; sync just changes where you pay the complexity.
  • Some see “sync engines” as a rebranding of familiar patterns (caching, local DBs, offline queues) rather than a radical shift.
  • Others say big shifts come from moving boundaries, not collapsing layers; there will still be servers, just less app logic on them.

Business Logic in the Database vs in the App

  • A recurring theme: if the DB is “the app,” where does business logic live?
  • Stored procedures / triggers / PL/SQL are cited as ways to keep logic near data, but people complain about testing, version control, lock‑in, and duplicated logic when some checks must also run in clients or other services.
  • Some advocate treating the RDBMS as an application framework with a thin UI; others call that an antipattern for anything non‑trivial.

Conflict Resolution and Local‑First

  • Many see conflict resolution as the central unsolved problem of sync and local‑first, and note the article barely addresses it.
  • Opinions diverge:
    • Some say conflicts are fundamentally domain‑specific and can never be “solved” by infrastructure; you pick strategies (LWW, custom merge) and accept rare anomalies.
    • Others point to CRDTs and transactional reconciliation schemes, but even proponents admit they only handle syntactic conflicts; semantic conflicts still need user or app‑level decisions.
  • Offline writes are where things get truly hard; several products intentionally avoid them or push resolution back to users/UX.

Scope and Limits of Sync Engines

  • Strong enthusiasm for sync in editor‑like, data‑ownership, or mobile/desktop scenarios: no spinners, offline support, optimistic UIs, “local-first” feel.
  • Skeptics argue there is no one general sync engine that works well at all scales and domains:
    • Large datasets (recommendation systems, logistics, airline booking) are poor fits for full local replication.
    • Enterprise apps need complex permissions, auditing, and server‑side side‑effects (emails, third‑party APIs) that don’t map cleanly to “database on the client.”
  • A common compromise: treat local data as a smart cache, sync subsets, and still use traditional APIs for writes or heavy queries.

Prior Art and Tooling

  • Commenters note this space is not new: CouchDB/PouchDB, Meteor, Lotus Notes, Dropbox‑style sync, custom engines in commercial products, and Oracle features like JSON “duality views” plus change notifications.
  • A long list of modern tools is mentioned (Zero, ElectricSQL, PowerSync, Triplit, Convex, Logux, RxDB, etc.), with the observation that everyone is reinventing sync slightly differently.
  • Several practitioners who built bespoke sync systems warn that naïve implementations quickly explode in complexity and become hard to maintain.

UX, Semantics, and “Magic” Layers

  • Sync isn’t just a data problem; it’s also UI and product design: when should live updates move the page under the user vs. show a “new data available” indicator?
  • Some prefer explicit API calls and SSE/WebSockets because “magic” sync layers are harder to reason about and debug.
  • Overall sentiment: sync engines are promising and increasingly important, but not a universal future; they’re another powerful tool with sharp edges.

Please stop externalizing your costs directly into my face

Scope of the problem and impact on small sites

  • Multiple operators of tiny blogs, wikis, games, and git forges report being “hammered” by scraper traffic far beyond real user numbers, often enough to crash services or force them offline.
  • Patterns described: single or few requests per IP, huge IP diversity (often residential ranges), misleading user agents, round‑the‑clock load, and disregard for caching headers.
  • Some have moved repos to large platforms or shut down public instances entirely; others see most of their bandwidth consumed by seemingly useless bot activity (e.g., repeated downloads of unchanged files).

Proposed technical and legal defenses

  • Common “pragmatic” suggestions: use Cloudflare or similar CDNs, build DDoS‑style reverse proxies with captchas, and heavily cache or deprioritize expensive endpoints like git blame.
  • Pushback: CDNs everywhere are “horrible for the open web,” and some claim CDNs still don’t stop smarter scrapers.
  • Legal ideas: make honoring robots.txt mandatory; force scrapers to publish IPs or face liability; allow action against VPNs or botnets that relay illegal scraping. Critics question jurisdiction, enforcement, and the risk of Internet balkanization.
  • Other ideas: proof‑of‑work or Privacy‑Pass‑style tokens, per‑user quotas, or requiring logins for heavy or all access—acknowledged as trading openness for survival.

Scraper obfuscation and ethics

  • Commenters note commercial residential proxy networks, suggesting LLM firms or contractors may route traffic through them; this and user‑agent spoofing are seen as evidence they know they’re unwelcome.
  • Some equate the behavior to DDoS or fraud and argue “AI culture” resembles crypto in its parasitic, “fuck you, got mine” norms. Others defend broad copyright‑infringing training as acceptable, especially when models are open‑weights.

Resistance strategies and poisoning

  • Ideas include embedding invisible, periodically changing “trap” phrases or fake facts to prove unauthorized training, and deliberately serving subtly broken code to get dropped as a training source.
  • Skeptics doubt poisoning matters much: the web already contains plenty of low‑quality or wrong content; LLMs just average it.

Future of the web and LLM attitudes

  • Some foresee more private, gated networks (WireGuard meshes, BBS‑like systems) and a “dark forest” Internet.
  • The article’s call to “just stop using LLMs” is widely seen as emotionally understandable but unrealistic; several report strong productivity from Claude/Cursor or local models, while others found AI coding tools net‑negative due to subtle errors and “agentic” code damage.

BYD says new fast-charging system could be as quick as filling up a tank

Perceived Significance of BYD’s Fast-Charging System

  • Some see this as a rare “real” EV breakthrough rather than the usual lab-only battery hype, noting it’s already going into production models.
  • Five‑minute charging is framed as practical parity with ICE refueling; beyond this, further speed gains have diminishing returns.
  • Others downplay it as an incremental advance and question whether it meaningfully changes everyday user behavior.

Technical Aspects: 1 MW, C‑Rates, and Battery Life

  • System is reported around 1,000 V / 1,000 A, with liquid‑cooled cables needed to keep weight and heat manageable.
  • Discussion of 4C vs 10C charging: some say conventional Li‑ion already tolerates ~4C; claims of 10C LFP packs are seen as potentially “marketing C” unless degradation under real cycles is disclosed.
  • Concerns persist about long‑term battery health, though others note modern EV packs generally last longer than expected. Solid-state is mentioned as a future mitigator.

Grid and Infrastructure Concerns

  • Debate over impact:
    • One side argues average energy demand doesn’t change—faster charging just means fewer plugs for the same traffic.
    • The opposing view stresses peak load: clusters of 1 MW chargers look like industrial loads (e.g., electric arc furnaces) and strain transformers and transmission.
  • Proposed mitigations: on‑site batteries or supercapacitors to buffer power; dynamic pricing to limit concurrent fast charging; expectation that China can expand infrastructure faster than many Western grids.

Fast Charging vs. Swappable Batteries

  • Some advocate standardized, swappable packs (especially for fleets and trucks) to allow slow, cheap off‑vehicle charging.
  • Others highlight problems: ownership and liability (getting back a worse pack), mechanical complexity, connector wear, safety, and lack of cross‑OEM standardization. NIO’s swap model is cited as working but niche.

China, Competition, and Policy

  • Several comments argue Chinese EVs (including BYD) are now ahead on tech, price, and manufacturing, and that Western industries—especially German—are at risk if policy and investment don’t adjust.
  • Counterpoints note German carmakers remain profitable and that wage differences and decades of accumulated manufacturing capability, not just subsidies or lax standards, explain China’s cost advantage.
  • Tariffs in the US/Canada are seen as shielding consumers from highly competitive Chinese EVs, for better or worse.

Environmental and Health Tangents

  • A study on elevated lithium in Beijing mothers/newborns sparks debate on links to battery industry vs other sources and on Chinese information control.
  • Some push back on using this as a generic anti‑China talking point, calling it xenophobic when disconnected from evidence.

UX and Privacy Concerns

  • A thread criticizes EVs becoming “iPhones on wheels” with telemetry, subscriptions, and intrusive infotainment.
  • Responses range from “buy a simpler EV and disable connectivity” to resigned views that privacy is poor across all modern cars, ICE and EV alike.

Moving away from US cloud services

Git hosting, CI/CD, and code platforms

  • Many suggest self-hosted forges (Gitea, Forgejo, Codeberg, Sourcehut, OneDev, Phabricator, Gerrit) or bare-bones git servers (gitolite + cgit).
  • People praise Gitea/Forgejo as lightweight, easy to manage, with GitHub‑like UIs and Actions-compatible CI; GitLab is seen as heavy and slow.
  • Others note that PR/CR workflows, issues, and CI integration are the hard part to migrate, not the git repos themselves.
  • Some argue that GitHub/NPΜ lock-in via ecosystem and discoverability is the real hurdle, even if self‑hosting is technically easy.

EU vs US privacy and jurisdiction

  • Strong disagreement: some contend there’s “no difference” between US and EU on privacy; others say this ignores real legal and cultural gaps (GDPR, fewer warrantless powers).
  • CLOUD Act and US surveillance laws mean “EU-hosted but US‑owned” is still legally exposed; examples given (Microsoft EU data vs US sanctions).
  • EU is criticised for its own anti‑encryption pushes (ChatControl, Europol statements), but defenders stress such attempts often fail and are more constrained than US practice.
  • Switzerland is debated: aligned with EU and GDPR‑equivalent law, but outside the EU and economically vulnerable to US pressure.

Cloud providers and digital sovereignty

  • Widespread concern about strategic dependence on AWS/Azure/GCP/O365: a “kill switch” or sanctions could cause systemic EU damage.
  • Some see a need for EU hyperscalers; others doubt Europe can or will match US scale and VC culture, and argue most users don’t need hyperscale anyway.
  • European options discussed: Hetzner, OVH, Scaleway, STACKIT, IONOS, Exoscale, Koyeb, UpCloud, Netcup. Hetzner/Scaleway get praise; OVH’s fires and support draw criticism.
  • Lock‑in via managed services (Cognito, Firebase, IAM) is viewed as the biggest obstacle to moving off US clouds.

Office/email/chat ecosystems

  • Microsoft 365 is seen as ubiquitous, tightly integrated, and “good enough,” especially for large orgs; others describe it as mediocre but unavoidable (Teams especially disliked).
  • Proton gets mixed reviews: strong privacy story and decent mail/pass tools vs weak search, filtering, IMAP support, and vendor lock‑in.
  • Alternatives mentioned: Tuta, Fastmail, mailbox.org, Migadu, Zoho, local ISPs, Infomaniak; many stress open protocols (IMAP/SMTP, CalDAV) to keep exit options.

Self‑hosting, “local‑first,” and broader shifts

  • Multiple commenters advocate going beyond “US → EU” and instead reducing all cloud dependence: local‑first apps, self‑hosted mail, Forgejo/Gitea, Nextcloud, Synology, etc.
  • Others counter that for most businesses, recreating M365/Google Workspace or AWS‑level reliability in‑house is unrealistic; they want European SaaS with clear exit strategies rather than full DIY.
  • Overall sentiment: moving some services (email, DNS, smaller SaaS) off US providers is feasible today; replacing hyperscalers and major ecosystems remains difficult and politically driven.

Block YouTube ads on AppleTV by decrypting and stripping ads from Profobuf (2022)

Apple TV TLS interception & certificate pinning

  • Several commenters were surprised tvOS allows installing custom CAs, enabling HTTPS MITM on Apple TV; some speculate this is for enterprise/EDU environments and reuse of iOS plumbing.
  • Others note most modern apps use certificate pinning and bypass the system store; some express surprise YouTube didn’t, while others say many mobile apps (especially banking) still pin.
  • People point out that newer Android restricts user CAs by default, and that pinning breaks corporate SSL proxies but is still widely used in apps.
  • There’s disagreement over whether YouTube should add pinning: it would easily kill this hack but might break corporate setups and legacy devices.

Protobuf “flaw” vs design & potential countermeasures

  • Technically minded commenters argue the described “flaw” (changing field tags so ad fields are ignored) is just Protobuf working as designed: unknown fields must be ignored for forward compatibility.
  • Others say the real “flaw” is YouTube’s app treating failures to parse ad info as “no ads to show” instead of erroring.
  • People note Google could instead:
    • Sign Protobuf payloads to prevent in-flight tampering;
    • Use certificate pinning;
    • Delay serving video segments until ad time elapses.
  • Some argue the business tradeoff (keeping playback robust across versions) likely outweighs the small number of users doing MITM ad-blocking.

Server-side ad insertion & technical limits

  • Multiple comments discuss server-side ad insertion (SSAI), noting Twitch/Hulu already splice ads into streams and ad stacks offer this “as a checkbox.”
  • Others counter that dynamic A/V splicing at scale raises complexity and compute/bandwidth costs; YouTube probably keeps client-side ads to stay cheap and flexible.
  • Several suggest community tools (e.g., SponsorBlock-style segment signatures) could still skip embedded ads, even if server-side.

YouTube Premium, creator revenue & fairness

  • There’s extensive debate about whether users should just pay for Premium instead of hacking around ads.
  • Some say Premium yields creators more per hour than ads and is “worth every penny,” especially given heavy usage and included music.
  • Others doubt official numbers, report mixed income splits, or note Premium still leaves inline sponsor reads and other platform-level promotion.
  • A recurring ethical thread:
    • One side: blocking ads while not paying is freeloading; if you value the content, support it.
    • Other side: ad ecosystems distort content (clickbait, length tuning, advertiser-driven censorship), and paying doesn’t fix those “second-order effects.”

Addiction, shorts, and network-wide friction

  • Many commenters express frustration with infinite-scroll formats (YouTube Shorts, Instagram Reels) and their own or their kids’ difficulty disengaging.
  • Suggested mitigations:
    • Network-level blocking (Pi-hole, pfSense, OpenWrt) for ads or specific paths;
    • Browser/user-script tools that hide feeds, comments, or shorts;
    • Artificial friction (delays, bandwidth throttling, Screen Time limits) to break the “instant reward” loop.
  • Some wish platforms simply offered a “disable shorts” setting; others argue this conflicts with the platforms’ incentives.

Alternatives & tooling

  • A large side-thread surveys alternatives:
    • Invidious instances, Yewtu.be, FreeTube, NewPipe, ReVanced, RSS + mpv/yt-dlp;
    • Local proxies (mitmproxy, goproxy-based) or custom C++/Go MITM filters instead of pfSense/mitmproxy overhead;
    • Apple TV alternatives (Android TV boxes, WebOS with homebrew) and discussion of UX tradeoffs.
  • Some report YouTube rate-limiting or blocking IPs used heavily by yt-dlp, suggesting a continuing arms race.

Piracy, DRM, and “ownership”

  • Several commenters argue piracy is morally justified given “buy” often means revocable access, paid tiers now include ads, and DRM blocks fair use (e.g., screen recording on mobile).
  • Others maintain piracy guarantees creators get nothing and that the underlying digital-media economy is broken but not a moral blank check.
  • There’s a broader resentment toward ad-driven “enshittification” and platforms exploiting their quasi-monopoly and town-square role, versus calls to either pay or opt out entirely.

Rhombus Language

Syntax, Goals, and Design Intent

  • Rhombus aims to keep Racket’s powerful macro tradition while replacing S-expressions with a more familiar, Python/ML-style indentation-based syntax (“shrubbery”).
  • The stated goal is not just “nicer syntax” but LISPy macro power in a non-parenthetical surface language; this is positioned as research/exploration rather than an industry-takeover attempt.
  • Some want a clearer “Why Rhombus?” story and/or a “killer app”; others say pedagogy and language design research are sufficient justification.

S-expressions, Readability, and Accessibility

  • Several commenters welcome an attempt to move beyond “parenthesis-ridden” Lisps, arguing S-exprs are objectively hard to visually parse, especially for beginners.
  • Others push back, saying Lisp readability issues are overstated and real difficulty is in unfamiliar vocabulary and abstractions, not parentheses.
  • There’s discussion of empathy for syntax-sensitive learners and analogies with accessibility in UI design; BASIC is mentioned as historically beginner-friendly due to simplicity, despite technical flaws.

Relation to Racket, Lisp, and Haskell/ML

  • Rhombus is essentially Racket/Scheme underneath, with full access to Racket libraries; some see it as “Python-like Racket,” others as “ML-syntax on a Lisp core.”
  • Comparisons to Haskell focus mostly on surface similarities (pattern matching, ::, indentation). Commenters stress it’s strict and impure, so very unlike Haskell semantically.
  • Prior work on non-S-expression Lisps (Dylan, M-expressions, sweet-expressions, etc.) is cited; Rhombus is seen as a new, more systematic approach.

Macro System and Pattern Matching

  • The macro system and enforestation/shrubbery model are highlighted as Rhombus’s main innovation: many core constructs (classes, patterns, operators) are supposedly implementable as library macros.
  • Compared to Scala/Rust/Elixir macros, Rhombus is described as significantly more expressive.
  • Its pattern-matching with ellipses (...) draws mixed reactions: powerful and compositional to Racket users, but “too magic” or counterintuitive to others.

Adoption, Ecosystem, and Production Use

  • Some question what niche Rhombus fills versus established macro-heavy or typed languages (Scala, Rust, Elixir, OCaml/F#).
  • Racket itself is reported in production for CLIs, web, desktop, and even mobile (via SwiftUI integration), but a few complain about weaker libraries compared to mainstream ecosystems.
  • Rhombus is dynamically typed; annotations act as runtime contracts rather than HM-style static typing, though related HM experiments exist in the Racket family.

But how to get to that European cloud?

Geopolitics, sovereignty, and who should build it

  • Some argue Europe (and possibly allies like Australia) needs its own cloud for legal and strategic independence, especially post‑CLOUD Act and as US defense guarantees look shakier.
  • Others say Australia should orient toward Asia or stay neutral, and that a truly “sovereign cloud” owned by a US firm (e.g. AWS “EU sovereign cloud”) is contradictory unless tech and control are fully localized.
  • A minority questions whether “sovereign cloud” is even coherent: renting “other people’s computers” is inherently non‑sovereign, so owning hardware and decentralizing might be safer.

Industrial policy, protectionism, and R&D

  • Proposals include tariffs on foreign clouds, “China-style” requirements for local partners owning local tech, and tying public spending to EU providers.
  • Counterpoint: tariffs are distortive and similar effects could come from subsidies or R&D support, but switching from incumbent US clouds still needs strong policy push.
  • Several want a “European DARPA” focused on long‑term, high‑risk tech, arguing current EU programs (Horizon, Gaia‑X) are too bureaucratic and consultant‑driven.
  • Disagreement over whether EU regulators and political culture (risk‑averse, lawyer‑led, fragmented financial markets) are capable of designing the right incentives.

Gaia‑X and previous “sovereign cloud” efforts

  • Gaia‑X is widely cited as a failure: design‑by‑committee, money to bureaucrats and large incumbents, little going to engineers.
  • Some describe it as covert subsidy for the usual big industrial players, with poor technical outcomes and even weak hiring signals.
  • Example from France: “sovereign” clouds that turned out to be Huawei‑run, later shut down, leaving customers repeatedly forced to migrate.

Existing European providers and product gaps

  • OVH, Hetzner, Scaleway, Infomaniak, Outscale and telecom‑run datacenters are mentioned as real, working European infrastructure.
  • Critique: many are essentially VPS/“lumber” sellers, lacking polished, self‑service, integrated services (autoscaling, managed DBs, S3‑like storage, CI/CD‑friendly patterns) that make hyperscalers attractive.
  • Others argue government workloads are often small and don’t need hyperscaler‑level scale; but reliability and operational tooling (rollouts, HA) still benefit from “cloudy” features.

Market dynamics, regulation, and free‑market debate

  • One camp says “if there’s demand, the market will provide”; government should cut regulation and taxes.
  • Another camp says cloud is a sticky, scale‑and‑network‑effects market where free entry fails; active regulation is needed to create demand for “subject only to EU law” providers.
  • Broader dispute over tariffs vs subsidies, and whether cloud is (or tends toward) oligopoly‑style concentration that justifies antitrust and industrial policy.

Talent, pay, and capital

  • Many see low European tech pay (e.g. ~€70k) as a core blocker: hard to “bend over backwards” to build massive infrastructure when US remote roles offer far more.
  • There’s debate over how big the EU–US gap really is once taxes, social benefits, and COL are included, but consensus that median EU tech salaries are far below US hyperscaler levels.
  • Some advocate aggressively poaching engineers who built AWS/Azure/GCP, combined with tax incentives, high‑speed rail connectivity (London–Paris–Randstad), and cross‑border startup funding.
  • Others emphasize Europe’s problem is risk‑averse capital: lots of pensions and industrial giants, very little true high‑risk VC.

Government procurement and practical experience

  • Several describe disastrous experiences with big “framework” hosting contracts for EU governments: slow, incompetent providers chosen on price, lots of red tape, poor K8s/HA designs, and attempts by dev teams to escape to AWS/Azure/Hetzner.
  • Lesson drawn: a European cloud for the public sector only works if it matches hyperscalers’ self‑service and developer experience.

Alternatives to a single Euro‑hyperscaler

  • Some think chasing an AWS clone is “fighting the last battle”; better to:
    • Standardize around simpler clouds (Hetzner‑like),
    • Encourage many smaller “drones” (local or sectoral providers) instead of one “aircraft carrier,”
    • Or push on‑prem / microcloud solutions for resilience against cyber or connectivity disruptions.
  • Cloud itself is questioned: for many workloads, traditional hosting with good ops may beat complex cloud constructs; cloud’s main value is operational convenience and managed services, not theoretical elastic scaling.

Soft power, ecosystems, and Microsoft/AWS dominance

  • US clouds benefit from entrenched ecosystems: universities teaching proprietary stacks, free credits for students, consulting firms tied to Microsoft, and “never fired for choosing X” brand equity.
  • Some suggest universities should stop teaching vendor‑specific stacks (e.g. ASP.NET/Azure) to weaken this lock‑in and create space for neutral or European alternatives.

Past and Present Futures of User Interface Design

Keyboard, Mouse, and Tactile Interfaces

  • Many commenters stress that both mouse and keyboard are indispensable; preference often depends on task and learned skill.
  • Some find mouse-based navigation faster for “jump to spot in code,” others argue advanced editor features (Vim motions, plugins like Easymotion) make keyboard vastly faster once learned.
  • Several propose richer physical/tactile setups: knobs, macro pads, MIDI keyboards, HOTAS-like controls, and game-style keypads (DataHand, Azeron, Tap).
  • Physical buttons/knobs are especially praised in domains needing speed and reliability (video editing, aviation, cash registers, cars).

Command Palettes and “Find Anywhere”

  • The rise of global “run command” / “find anywhere” palettes is seen as a major power-user improvement, reducing the need to memorize shortcuts or dig through menus.
  • Critiques: in some apps they replace explorable menu bars; one suggestion is to have search highlight the matching menu item to teach the UI’s structure over time.
  • OS-level versions (e.g., menu search) are appreciated when they exist.

Why the Keyboard Persists

  • Repeated attempts in industry labs to “kill the keyboard” reportedly failed; alternatives looked cool in demos but were worse in real use.
  • Consensus: keyboard, mouse, touch, and some voice will coexist, each fitting different contexts; interfaces should be descriptivist (fit existing behavior), not prescriptive.
  • Dynamic-key displays (Optimus Maximus, Stream Deck, Flux) are admired conceptually, but some argue they undermine muscle memory if layouts change too much.

Voice, Automation, and Non-Visual UIs

  • Many see voice as niche: great for driving, accessibility, or classrooms, but socially inappropriate or privacy-breaking in most public or work settings.
  • Ideas like lip-reading or subvocal sensors are discussed but viewed as technically and socially uncertain.
  • One thread explores “automation as output”: browser/assistant systems where the UI’s result is actions taken, not screens rendered.

AI Chat as Interface Layer

  • One camp expects AI chat to remove large swaths of traditional GUI (IDE refactoring menus, complex 3D tools), shifting toward iterative natural-language workflows.
  • Others are strongly skeptical, citing hallucinations, fragile tests, increased bugs and code churn, and diminishing returns from scaling current LLMs.
  • Even skeptics concede it can help with boilerplate; disagreement centers on depth of reliance, not existence.

Touchscreens vs Physical Controls

  • Touch is praised for flexibility and multilingual input, but widely criticized in cars and appliances: unsafe, slow, hard to use when wet/dirty.
  • Commenters note touch is “cheaper for manufacturers” and visually marketable, not necessarily better for users.
  • Recurrent theme: knobs, switches, and mechanical keyboards remain superior where tactile feedback and eyes-free operation matter.

Design Philosophy: Familiarity Over Flash

  • Strong support for consistency, idiomatic controls, and building on decades of desktop conventions.
  • Novel UIs are seen as high-risk, hard to make accessible, and often driven by marketing or sci-fi aesthetics rather than real tasks.

GIMP 3.0

Major new features and technical changes

  • Non-destructive editing is widely seen as the headline change and a long‑awaited gap closer; users are relieved to avoid “bazillions” of backup layers.
  • Text handling is substantially upgraded: outlines, shadows, bevels, editable styles, and better workflows make it more viable for comics, posters, and YouTube thumbnails.
  • Copy/paste now creates a new layer instead of a “floating selection,” fixing a long‑standing UX trap; floating selections remain as an explicit option.
  • Partial CMYK support exists (import/export, soft-proofing, CMYK readout), but full native CMYK and spot colors are still on the wishlist.
  • GTK3 migration brings a “modern desktop” toolkit, Apple Silicon builds, and paves the way for more frequent minor releases and a stable plugin API.

Release cadence and GTK history

  • Some criticize the ~7‑year gap and stalled visible progress while GTK2→GTK3 was done.
  • Others defend the “when it’s done” model for non‑security‑critical desktop apps, preferring fewer, larger, well‑integrated changes.
  • There’s hope the GTK4 transition will be smoother and not block features as long.

UI/UX experience

  • Strong split: many find GIMP’s UX clunky, modal, and “hostile,” especially compared to Photoshop, Krita, or Paint.NET; others say it’s fine once learned or if it’s your first editor.
  • Specific pain points: floating selection behavior (now mostly fixed), confusing layer move/text move behavior, lack of easy arrows/shapes, “GEGL operations” leaking implementation terms into menus, and discoverability of tools (grouped icons, monochrome themes).
  • Power users highlight keyboard shortcuts, configurability, and toolbox/search tweaks that make it efficient once customized.
  • Several argue GIMP needs a Blender‑style UX overhaul; others think its UI is broadly in line with classic image editors and not fundamentally broken.

Comparisons to other tools

  • Krita is repeatedly mentioned: often preferred for painting, brush engine, and UX; debate over which is better for photo editing and color spaces.
  • Inkscape is recommended for text/layout and some collage tasks; RawTherapee/Darktable for photo workflows; Paint.NET/Pinta for simple raster jobs; Photopea and Figma as non‑FOSS but easier options.

AI and plugin ecosystem

  • Some users strongly want built‑in diffusion, generative fill, super‑resolution, and segmentation like commercial tools; others push back against “AI in everything.”
  • Consensus that such features belong in plugins; several note existing diffusion integrations for other editors and GIMP plugins for similar tasks.
  • The old plugin registry is effectively dead; there’s interest in a modern replacement and in leveraging the now‑stable API.

Naming, platforms, and ecosystem

  • The name “GIMP” is still contentious; suggestions include “GNU IMP,” while others dismiss concerns.
  • macOS users report font rendering issues and historically weaker support; maintainers cite fewer testers and upstream toolkit bugs.
  • Some distro discussions focus on whether GIMP 3 enables dropping GTK2 and Python2; several major distros are already moving that way.

France plots tax on super-rich to rearm – and Britain could be next

Who Counts as “Super‑Rich” and Who Gets Hit?

  • Several argue that “super‑rich” rhetoric masks taxes that mostly hit upper‑middle professionals and ordinary asset owners, not billionaires.
  • Examples from Switzerland and housing markets suggest wealth thresholds can be below what’s needed for basic homeownership in major cities.
  • Concern that new “defence” taxes will fall mainly on workers and professionals who are less mobile than the ultra‑rich.

Mobility, Capital Flight, and the Laffer Curve

  • One side claims high top rates and wealth taxes just drive millionaires/billionaires abroad (citing France’s past wealth tax, UK “non‑dom” changes, US state tax moves, and Hollande’s failed 75% rate).
  • Others reply that only a small fraction leave, many were barely taxed anyway, and remaining rich still generate higher revenue; capital flight numbers versus annual revenue are contested and seen as often misrepresented.
  • Debate over whether the Laffer curve meaningfully constrains current Western tax rates; some say empirical support exists only at very high rates, others insist behaviorally it’s obvious even if hard to quantify.

Wealth, Land, and Inheritance Taxes

  • Strong support from some for taxing land and inherited/gifted wealth more than labor income (Georgist arguments), viewing land/monopoly rents as unproductive.
  • Critics argue Georgism is outdated in an intangible, services, and IP‑based economy, and that land is more evenly distributed than wealth so incidence may not be as progressive as advertised.
  • Wealth taxes raise practical problems for illiquid assets (paper equity, inherited land) and are seen by opponents as slow confiscation via compounding.

Historical Tax Regimes and Investment

  • Dispute over lessons from mid‑20th‑century US top marginal rates (~90%):
    • One side: high effective rates coincided with strong growth, a broad middle class, and productive public investment.
    • Other side: few actually paid headline rates due to shelters; very high rates diverted capital into bad tax‑driven investments and encouraged avoidance.
  • Arguments over whether rich “hoard” wealth or necessarily invest it, the role of stock buybacks, and proposals ranging from ~10% flat tax to much steeper progressive schedules.

Defence Spending vs. “Adventurism”

  • Some see taxing the wealthy for rearmament as fair: they benefit from national security and stable markets.
  • Others say France/UK already have nuclear deterrents; extra spending is framed as NATO geopolitics and foreign adventures, not self‑defence.
  • A minority welcomes EU rearmament as industrial policy: more domestic arms production and high‑skill jobs, reducing reliance on US contractors.

Evasion, Inequality, and Social Risk

  • Widespread skepticism that any “super‑rich” tax will bite those using offshore structures; expectation is higher income taxes on domestically‑based high earners instead.
  • Deep concern about rising inequality; some fear eventual unrest, others counter that modern surveillance, drones and robotics increase state and elite coercive capacity.

Harvard says tuition will be free for families making $200K or less

Who Benefits and Student Demographics

  • Some commenters assume Harvard mostly admits rich students; others cite Crimson survey data suggesting a majority of undergrads come from families under ~$200–250k.
  • Skepticism remains that this mirrors the broader US income distribution or truly represents lower- and middle-income families.
  • It’s emphasized that Ivy League cohorts are often “middle class” by elite standards, plus a significant number of very wealthy students.

Policy Details, Misconceptions, and Edge Cases

  • Several point out this is not entirely new, but an expansion (from a previous ~$150k threshold) and that aid is on a sliding scale, not an all-or-nothing cutoff.
  • Under ~$100k, Harvard reportedly covers tuition, housing, food, and services; above $200k, some aid may still be available depending on assets and family situation.
  • Tools like Harvard’s net-price calculator ask for family size, kids in college, income, and assets—implying these all factor into aid. “Typical assets” is seen as vague.
  • One commenter notes assets are hit at ~5%/year, so low income with high savings still leads to substantial expected contribution.

Cost of Living and “Well Off” Debate

  • Strong disagreement over whether $200k households can ever be “not well off.”
  • Some argue high-cost areas (e.g., SF), large families, childcare, housing, healthcare, and chronic health issues can strain such incomes.
  • Others counter that most hardship at that level is budgeting/lifestyle choice, and kids “don’t cost that much,” prompting pushback from parents in expensive cities.

Sticker Price, Revenue Motives, and Endowment

  • Confusion over who really pays “sticker”; the article says ~55% get aid, implying ~45% pay list price, though some aid still exists above $200k.
  • One view: high sticker + variable discounts is price discrimination to extract close to each family’s max willingness to pay, analogous to “call for pricing” SaaS.
  • Others reply that if pure revenue-maximization were the goal, Harvard could charge more, admit only full-pay students, or grow class size—but reputational and mission constraints limit this.
  • Debate over whether operating costs are inherently “insanely expensive” versus inflated because Harvard can afford it; most agree the credential and network are major parts of the value.
  • Some argue Harvard’s ~$55B endowment could cover undergraduate tuition entirely; others note withdrawal-rate constraints and restricted-purpose funds.

Admissions, Equity, and Gaming

  • Concerns that geographic cost differences mean a $150k Iowa family qualifies while a $210k California family struggles.
  • Others stress that aid is not a strict step function and that human review/appeals (FAFSA-style “special circumstances”) can account for outliers.
  • Commenters speculate about “gaming” by lowering reported income (e.g., early retirement), but a first-hand account says asset-based assessment blocks simple manipulation.
  • Some fear that “need-blind” claims may erode if free tuition expands, nudging admissions toward more full-pay students, though Harvard explicitly says finances don’t affect admission decisions.

Student Loans and the Broader US System

  • Several explain that most US students at private universities don’t pay the sticker price and that federal income-based repayment reduces effective student-loan burden for many.
  • Others push back that this ignores those who don’t complete degrees, take on high debt for low-ROI programs, or fall through bureaucratic cracks (e.g., “paper rich” but unsupported families).
  • For-profit universities are singled out as predatory, exploiting confusion about aid.

Public Funding and Taxation Debate

  • Some call for taxpayer-funded or wealth-funded tuition broadly, arguing college and healthcare should be public goods.
  • Others counter that funding universal free college can’t be done by taxing only “the super wealthy”; in other countries, middle and upper-middle classes pay heavy taxes too.
  • Underlying disagreement: whether focusing tax hikes only on the top 1% is serious policy or “cosplay” that ignores the much larger base in the top 10%.

Comparisons and Ideological Reactions

  • A French commenter notes elite schools there are expensive for the rich but heavily subsidized and progressive by income; universities are nearly free, seen as a working “social elevator.”
  • Some US commenters express enthusiasm and hope other elite schools follow; others see income-based pricing as “anti-American” or “lipstick on the pig” of ever-rising tuition that consumes discretionary income.

Amazon plans to lay off 14,000 managerial positions to save $3.5B yearly

Validity of the story

  • Several commenters say the article is misleading or outright wrong.
  • It appears to be recycled from an older Business Insider piece based on a Morgan Stanley analyst memo interpreting Amazon’s plan to change the IC:manager ratio.
  • People familiar with Amazon say the real 2024 change mostly involved reorgs and moves from manager → IC, not 14k manager layoffs.
  • A linked Fast Company piece is cited stating the “14,000 managers laid off” story is bogus and the $3.5B figure is analyst speculation, not an announced target.

Scale and numbers

  • Amazon has ~1.5M employees; 14k would be <1% of total staff but ~13% of managers, so non‑trivial within that layer.
  • Back‑of‑the‑envelope math (3.5B / 14k) yields ~$250k per manager in annual cost, which some see as low for tech managers but high if it includes global, non‑tech management.

Role and value of managers

  • Strong anti‑manager sentiment: many describe middle/upper managers as “status brokers,” political operators, or “human ticket classifiers” who add bureaucracy and block progress.
  • Others argue good managers are essential: shielding teams from chaos, handling politics, mentoring, hiring, and coordinating unsexy work. Several say they’ve only stayed or left jobs because of managers.
  • Multiple people note that bad managers have a far larger “blast radius” than bad engineers.

Amazon’s culture and incentives

  • Commenters blame Amazon’s internal processes, competitiveness, and performance‑improvement culture more than individual managers.
  • Managers are seen as optimizing for upward perception and survival through reorgs, not necessarily team or company value.
  • Some argue middle management is the effective culture employees experience; others say real power sits several layers above those being cut.

Layoffs, politics, and selection

  • Debate over whether layoffs “cull the worst” or just those least politically protected; many note the most political managers are best positioned to survive.
  • Some frame the move as shareholder‑value theater and cost-trimming amid macro headwinds, not genuine efficiency reform.
  • There’s concern that fewer managers means overloaded remaining ones and less support for career development and compensation discussions.

AI and automation of management

  • Several speculate AI will increasingly replace routine management tasks: ticket triage, performance metrics, documentation for HR, even scripted PIPs.
  • This is seen as a coming “corporate dystopia,” where automated oversight and firing lack human empathy, while high‑level power structures remain intact.